Skip to content

Commit f581f68

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1669724r
2 parents 4125bcf + 0f88376 commit f581f68

File tree

661 files changed

+5620
-3949
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

661 files changed

+5620
-3949
lines changed

.openpublishing.redirection.json

Lines changed: 382 additions & 6 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 67 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/30/2020
9+
ms.date: 03/23/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -23,7 +23,7 @@ Multi-factor authentication (MFA) is a great way to secure your organization, bu
2323
| --- | --- | --- |
2424
| Passwordless | Windows 10 Device, phone, or security key | Biometric or PIN |
2525

26-
Each organization has different needs when it comes to authentication. Microsoft offers the following three passwordless authentication options:
26+
Each organization has different needs when it comes to authentication. Microsoft offers the following three passwordless authentication options that integrate with Azure Active Directory (Azure AD):
2727

2828
- Windows Hello for Business
2929
- Microsoft Authenticator app
@@ -35,6 +35,20 @@ Each organization has different needs when it comes to authentication. Microsoft
3535

3636
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN is directly tied to the user's PC, which prevents access from anyone other than the owner. With public key infrastructure (PKI) integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
3737

38+
![Example of a user sign-in with Windows Hello for Business](./media/concept-authentication-passwordless/windows-hellow-sign-in.jpeg)
39+
40+
The following steps show how the sign-in process works with Azure Active Directory.
41+
42+
![Diagram that outlines the steps involved for user sign-in with Windows Hello for Business](./media/concept-authentication-passwordless/windows-hello-flow.png)
43+
44+
1. A user signs into Windows using biometric or PIN gesture. The gesture unlocks the Windows Hello for Business private key and is sent to the Cloud Authentication security support provider, referred to as the *Cloud AP provider*.
45+
1. The Cloud AP provider requests a nonce from Azure AD.
46+
1. Azure AD returns a nonce that's valid for 5 minutes.
47+
1. The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure AD.
48+
1. Azure AD validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. When the nonce is validated, Azure AD creates a primary refresh token (PRT) with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.
49+
1. The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypts the session key and protects the session key using the device's Trusted Platform Module (TPM).
50+
1. The Cloud AP provider returns a successful authentication response to Windows. The user is then able to access Windows as well as cloud and on-premises applications without the need to authenticate again (SSO).
51+
3852
The Windows Hello for Business [planning guide](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-planning-guide) can be used to help you make decisions on the type of Windows Hello for Business deployment and the options you'll need to consider.
3953

4054
## Microsoft Authenticator App
@@ -45,6 +59,19 @@ Allow your employee's phone to become a passwordless authentication method. You
4559

4660
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
4761

62+
Passwordless authentication using the Authenticator App follows the same basic pattern as Windows Hello for Business. It's a little more complicated as the user needs to be identified so that Azure AD can find the Microsoft Authenticator App version being used:
63+
64+
![Diagram that outlines the steps involved for user sign-in with the Microsoft Authenticator App](./media/concept-authentication-passwordless/authenticator-app-flow.png)
65+
66+
1. The user enters their username.
67+
1. Azure AD detects that the user has a strong credential and starts the Strong Credential flow.
68+
1. A notification is sent to the app via Apple Push Notification Service (APNS) on iOS devices, or via Firebase Cloud Messaging (FCM) on Android devices.
69+
1. The user receives the push notification and opens the app.
70+
1. The app calls Azure AD and receives a proof-of-presence challenge and nonce.
71+
1. The user completes the challenge by entering their biometric or PIN to unlock private key.
72+
1. The nonce is signed with the private key and sent back to Azure AD.
73+
1. Azure AD performs public/private key validation and returns a token.
74+
4875
## FIDO2 security keys
4976

5077
FIDO2 security keys are an unphishable standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication. FIDO allows users and organizations to leverage the standard to sign in to their resources without a username or password using an external security key or a platform key built into a device.
@@ -53,6 +80,20 @@ For public preview, employees can use security keys to sign in to their Azure AD
5380

5481
![Sign in to Microsoft Edge with a security key](./media/concept-authentication-passwordless/concept-web-sign-in-security-key.png)
5582

83+
The following process is used when a user signs in with a FIDO2 security key:
84+
85+
![Diagram that outlines the steps involved for user sign-in with a FIDO2 security key](./media/concept-authentication-passwordless/fido2-security-key-flow.png)
86+
87+
1. The user plugs the FIDO2 security key into their computer.
88+
2. Windows detects the FIDO2 security key.
89+
3. Windows sends an authentication request.
90+
4. Azure AD sends back a nonce.
91+
5. The user completes their gesture to unlock the private key stored in the FIDO2 security key's secure enclave.
92+
6. The FIDO2 security key signs the nonce with the private key.
93+
7. The primary refresh token (PRT) token request with signed nonce is sent to Azure AD.
94+
8. Azure AD verifies the signed nonce using the FIDO2 public key.
95+
9. Azure AD returns PRT to enable access to on-premises resources.
96+
5697
While there are many keys that are FIDO2 certified by the FIDO Alliance, Microsoft requires some optional extensions of the FIDO2 Client-to-Authenticator Protocol (CTAP) specification to be implemented by the vendor to ensure maximum security and the best experience.
5798

5899
A security key **MUST** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible:
@@ -89,6 +130,30 @@ If you're a vendor and want to get your device on this list of supported devices
89130
- Microsoft Authenticator App: Works in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
90131
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge (both legacy and new Edge).
91132

133+
## Choose a passwordless method
134+
135+
The choice between these three passwordless options depends on your company's security, platform, and app requirements.
136+
137+
Here are some factors for you to consider when choosing Microsoft passwordless technology:
138+
139+
||**Windows Hello for Business**|**Passwordless sign-in with the Microsoft Authenticator app**|**FIDO2 security keys**|
140+
|:-|:-|:-|:-|
141+
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Microsoft Authenticator app<br>Phone (iOS and Android devices running Android 6.0 or above.)|Windows 10, version 1809 or later<br>Azure Active Directory|
142+
|**Mode**|Platform|Software|Hardware|
143+
|**Systems and devices**|PC with a built-in Trusted Platform Module (TPM)<br>PIN and biometrics recognition |PIN and biometrics recognition on phone|FIDO2 security devices that are Microsoft compatible|
144+
|**User experience**|Sign in using a PIN or biometric recognition (facial, iris, or fingerprint) with Windows devices.<br>Windows Hello authentication is tied to the device; the user needs both the device and a sign-in component such as a PIN or biometric factor to access corporate resources.|Sign in using a mobile phone with fingerprint scan, facial or iris recognition, or PIN.<br>Users sign in to work or personal account from their PC or mobile phone.|Sign in using FIDO2 security device (biometrics, PIN, and NFC)<br>User can access device based on organization controls and authenticate based on PIN, biometrics using devices such as USB security keys and NFC-enabled smartcards, keys, or wearables.|
145+
|**Enabled scenarios**| Password-less experience with Windows device.<br>Applicable for dedicated work PC with ability for single sign-on to device and applications.|Password-less anywhere solution using mobile phone.<br>Applicable for accessing work or personal applications on the web from any device.|Password-less experience for workers using biometrics, PIN, and NFC.<br>Applicable for shared PCs and where a mobile phone is not a viable option (such as for help desk personnel, public kiosk, or hospital team)|
146+
147+
Use the following table to choose which method will support your requirements and users.
148+
149+
|Persona|Scenario|Environment|Passwordless technology|
150+
|:-|:-|:-|:-|
151+
|**Admin**|Secure access to a device for management tasks|Assigned Windows 10 device|Windows Hello for Business and/or FIDO2 security key|
152+
|**Admin**|Management tasks on non-Windows devices| Mobile or non-windows device|Passwordless sign-in with the Microsoft Authenticator app|
153+
|**Information worker**|Productivity work|Assigned Windows 10 device|Windows Hello for Business and/or FIDO2 security key|
154+
|**Information worker**|Productivity work| Mobile or non-windows device|Passwordless sign-in with the Microsoft Authenticator app|
155+
|**Frontline worker**|Kiosks in a factory, plant, retail, or data entry|Shared Windows 10 devices|FIDO2 Security keys|
156+
92157
## Next steps
93158

94159
[Enable FIDO2 security key passwordlesss options in your organization](howto-authentication-passwordless-security-key.md)

articles/active-directory/azuread-dev/active-directory-acs-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 820acdb7-d316-4c3b-8de9-79df48ba3b06
98
ms.service: active-directory
109
ms.subservice: azuread-dev
1110
ms.custom: aaddev
@@ -14,6 +13,7 @@ ms.workload: identity
1413
ms.date: 10/03/2018
1514
ms.author: ryanwi
1615
ms.reviewer: jlu, annaba, hirsin
16+
ROBOTS: NOINDEX
1717
---
1818

1919
# How to: Migrate from the Azure Access Control Service

articles/active-directory/azuread-dev/active-directory-authentication-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 2e4fc79a-0285-40be-8c77-65edee408a22
98
ms.service: active-directory
109
ms.subservice: azuread-dev
1110
ms.topic: conceptual
@@ -14,6 +13,7 @@ ms.date: 12/01/2018
1413
ms.author: ryanwi
1514
ms.reviewer: saeeda, jmprieur
1615
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1717
---
1818

1919
# Azure Active Directory Authentication Libraries

articles/active-directory/azuread-dev/active-directory-devhowto-adal-error-handling.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.custom: aaddev
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.date: 02/27/2017
14+
ROBOTS: NOINDEX
1415
---
1516

1617
# Error handling best practices for Azure Active Directory Authentication Library (ADAL) clients

articles/active-directory/azuread-dev/app-types.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.date: 09/24/2018
1313
ms.author: ryanwi
1414
ms.reviewer: saeeda, jmprieur, andret
1515
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1617
---
1718

1819
# Application types in v1.0
@@ -46,7 +47,7 @@ In addition, if your application needs a specific piece or segment of an end-to-
4647

4748
### Registering an app that uses the Azure AD v1.0 endpoint
4849

49-
Any application that outsources authentication to Azure AD must be registered in a directory. This step involves telling Azure AD about your application, including the URL where its located, the URL to send replies after authentication, the URI to identify your application, and more. This information is required for a few key reasons:
50+
Any application that outsources authentication to Azure AD must be registered in a directory. This step involves telling Azure AD about your application, including the URL where it's located, the URL to send replies after authentication, the URI to identify your application, and more. This information is required for a few key reasons:
5051

5152
* Azure AD needs to communicate with the application when handling sign-on or exchanging tokens. The information passed between Azure AD and the application includes the following:
5253

@@ -67,7 +68,7 @@ Provisioning becomes clearer when you understand that there are two categories o
6768

6869
### Additional considerations when developing single tenant or multi-tenant apps
6970

70-
Some additional considerations arise when developing a multi-tenant application instead of a single tenant application. For example, if you are making your application available to users in multiple directories, you need a mechanism to determine which tenant they’re in. A single tenant application only needs to look in its own directory for a user, while a multi-tenant application needs to identify a specific user from all the directories in Azure AD. To accomplish this task, Azure AD provides a common authentication endpoint where any multi-tenant application can direct sign-in requests, instead of a tenant-specific endpoint. This endpoint is `https://login.microsoftonline.com/common` for all directories in Azure AD, whereas a tenant-specific endpoint might be `https://login.microsoftonline.com/contoso.onmicrosoft.com`. The common endpoint is especially important to consider when developing your application because you’ll need the necessary logic to handle multiple tenants during sign-in, sign-out, and token validation.
71+
Some additional considerations arise when developing a multi-tenant application instead of a single tenant application. For example, if you are making your application available to users in multiple directories, you need a mechanism to determine which tenant they're in. A single tenant application only needs to look in its own directory for a user, while a multi-tenant application needs to identify a specific user from all the directories in Azure AD. To accomplish this task, Azure AD provides a common authentication endpoint where any multi-tenant application can direct sign-in requests, instead of a tenant-specific endpoint. This endpoint is `https://login.microsoftonline.com/common` for all directories in Azure AD, whereas a tenant-specific endpoint might be `https://login.microsoftonline.com/contoso.onmicrosoft.com`. The common endpoint is especially important to consider when developing your application because you'll need the necessary logic to handle multiple tenants during sign-in, sign-out, and token validation.
7172

7273
If you are currently developing a single tenant application but want to make it available to many organizations, you can easily make changes to the application and its configuration in Azure AD to make it multi-tenant capable. In addition, Azure AD uses the same signing key for all tokens in all directories, whether you are providing authentication in a single tenant or multi-tenant application.
7374

0 commit comments

Comments
 (0)